shoyo / acoustic-keyloggerLinks
Pipeline of a keylogging attack using just an audio signal and unsupervised learning.
☆149Updated 2 years ago
Alternatives and similar repositories for acoustic-keylogger
Users that are interested in acoustic-keylogger are comparing it to the libraries listed below
Sorting:
- Let's brute force this hotel's tv.☆80Updated 5 years ago
- IPv4 and IPv6 traceroute fake hop generator through IP spoofing☆111Updated 9 months ago
- Recovers pixelized text from images☆192Updated 3 years ago
- ☆522Updated 6 months ago
- 🧠 🔎 🤖 Kitsune is an artificial neural network designed to detect and correlate Twitter profiles with similar behaviours.☆244Updated 3 years ago
- This python script uses TOR to get a new IP address.. For whatever reason you might need that☆41Updated this week
- Keystroke injection vulnerabilities in wireless presentation clickers☆97Updated 5 years ago
- Hash identification program.☆153Updated 3 years ago
- Use random bot scanning the internet to seed a Conways Game of Life running on a small LCD on my desk☆40Updated 4 years ago
- Apple geolocation services reverse engineering. Database scraper.☆64Updated last year
- Rainbow table generation & lookup tools. Make Rainbow Tables Great Again!☆203Updated 3 years ago
- Repository for the IPvSeeYou talk at Black Hat 2021☆85Updated 2 years ago
- A tool for processing a lot of pcaps using tshark☆154Updated last year
- Inaudible Voice Commands☆106Updated 3 years ago
- Mirage is a powerful and modular framework dedicated to the security analysis of wireless communications.☆299Updated 3 months ago
- its like a tricorder, for your wireless world.☆111Updated last year
- Hashcat WPA/WPA2 server☆63Updated 4 months ago
- A targeted DNS cache poisoner☆121Updated 2 years ago
- Source to www.draw.io☆99Updated 6 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆235Updated 3 months ago
- RattaGATTa: Scalable Bluetooth Low-Energy Survey Using a pool of collectors to scan and connect to BTLE devices, shedding light on the in…☆41Updated 5 months ago
- ☆231Updated 2 years ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆135Updated last year
- Business search, fun with rate limiting☆19Updated 5 years ago
- Freedom Shield was developed to protect the rights of individuals to peaceably assemble and petition their government.☆72Updated 5 years ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆197Updated 3 years ago
- ☆128Updated 2 years ago
- A pure Python script to easily get a reverse shell☆51Updated 2 years ago
- ADDVulcan satellite hacking solutions for for Hack-A-Sat 2020☆50Updated 4 years ago
- Simple tools to make reverse engineering and console cowboying easier, primarily by data translation and manipulation + file handle pipin…☆601Updated 2 weeks ago